0% found this document useful (0 votes)
20 views

Question

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Question

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 20

SECTION 1 GENERAL IT

What does IT stand for?

OPTION A) International Technology


OPTION B) Information Technology
OPTION C) Internet Technology
OPTION D) Internal Technology
Answer: OPTION B) Information Technology

Which of the following is the primary function of an operating system?

OPTION A) To manage hardware resources


OPTION B) To process data
OPTION C) To compile programs
OPTION D) To encrypt data
Answer: OPTION A) To manage hardware resources

What is the full form of URL?

OPTION A) Universal Resource Locator


OPTION B) Uniform Resource Locator
OPTION C) Unique Resource Locator
OPTION D) Uniform Resource Language
Answer: OPTION B) Uniform Resource Locator

Which protocol is used for transferring web pages over the internet?

OPTION A) FTP
OPTION B) HTTP
OPTION C) TCP/IP
OPTION D) SMTP
Answer: OPTION B) HTTP

Which of the following is not an operating system?

OPTION A) Linux
OPTION B) Windows
OPTION C) Python
OPTION D) macOS
Answer: OPTION C) Python

Section 2: Computer Programming

Which of the following is a high-level programming language?

OPTION A) Assembly
OPTION B) C++
OPTION C) Machine Code
OPTION D) Binary Code
Answer: OPTION B) C++

Which of the following is a valid variable name in Python?

OPTION A) 2myVar
OPTION B) _myVar
OPTION C) my-Var
OPTION D) MyVar@123
Answer: OPTION B) _myVar

Which data type is used to store true or false values?

OPTION A) Integer
OPTION B) Boolean
OPTION C) String
OPTION D) Char
Answer: OPTION B) Boolean

Which function is used to display output in Python?

OPTION A) print()
OPTION B) output()
OPTION C) echo()
OPTION D) show()
Answer: OPTION A) print()

What is the main purpose of the "return" keyword in functions?

OPTION A) To end the function


OPTION B) To display output
OPTION C) To send a value back to the caller
OPTION D) To declare a function
Answer: OPTION C) To send a value back to the caller

Section 3: Web Development

Which language is primarily used for styling web pages?

OPTION A) HTML
OPTION B) CSS
OPTION C) JavaScript
OPTION D) Python
Answer: OPTION B) CSS

Which of the following is a client-side scripting language?

OPTION A) Java
OPTION B) PHP
OPTION C) JavaScript
OPTION D) SQL
Answer: OPTION C) JavaScript

What does HTML stand for?

OPTION A) HighText Markup Language


OPTION B) HyperText Markup Language
OPTION C) HyperTool Markup Language
OPTION D) None of the above
Answer: OPTION B) HyperText Markup Language

Which of the following is used to define a hyperlink in HTML?

OPTION A) <link>
OPTION B) <a>
OPTION C) <h1>
OPTION D) <href>
Answer: OPTION B) <a>
Which of the following HTML tags is used to create a table?

OPTION A) <table>
OPTION B) <form>
OPTION C) <div>
OPTION D) <header>
Answer: OPTION A) <table>

Section 4: Networking and Security

What does DNS stand for?

OPTION A) Digital Name Server


OPTION B) Domain Name System
OPTION C) Data Name Server
OPTION D) Domain Network Server
Answer: OPTION B) Domain Name System

Which of the following is used to protect a network from unauthorized access?

OPTION A) Router
OPTION B) Switch
OPTION C) Firewall
OPTION D) Hub
Answer: OPTION C) Firewall

What is the primary purpose of an IP address?

OPTION A) To identify the source of a packet


OPTION B) To encrypt a message
OPTION C) To identify a device on a network
OPTION D) To store data
Answer: OPTION C) To identify a device on a network

Which protocol is commonly used to send email?

OPTION A) HTTP
OPTION B) FTP
OPTION C) SMTP
OPTION D) IMAP
Answer: OPTION C) SMTP

Which of the following is a type of attack where the attacker intercepts and alters
communication between two parties?

OPTION A) Denial of Service (DoS)


OPTION B) Man-in-the-middle
OPTION C) Phishing
OPTION D) Spoofing
Answer: OPTION B) Man-in-the-middle

Section 5: Databases

Which of the following is a relational database management system?

OPTION A) MongoDB
OPTION B) MySQL
OPTION C) Firebase
OPTION D) Cassandra
Answer: OPTION B) MySQL

Which SQL command is used to retrieve data from a database?

OPTION A) GET
OPTION B) SELECT
OPTION C) FETCH
OPTION D) PULL
Answer: OPTION B) SELECT

Which of the following is used to store and manage data in a structured format?

OPTION A) Cache
OPTION B) Database
OPTION C) File system
OPTION D) Memory
Answer: OPTION B) Database

What is the default port number for HTTP?

OPTION A) 443
OPTION B) 80
OPTION C) 21
OPTION D) 8080
Answer: OPTION B) 80

Which of the following is a non-relational (NoSQL) database?

OPTION A) Oracle
OPTION B) PostgreSQL
OPTION C) MongoDB
OPTION D) SQL Server
Answer: OPTION C) MongoDB

Section 6: Operating Systems

Which of the following is the default file system used by Windows?

OPTION A) FAT32
OPTION B) NTFS
OPTION C) ext4
OPTION D) HFS
Answer: OPTION B) NTFS

Which command is used to list files in a Unix-based system?

OPTION A) ls
OPTION B) list
OPTION C) dir
OPTION D) show
Answer: OPTION A) ls

What is the main function of a device driver?

OPTION A) To enhance the speed of the device


OPTION B) To communicate with the operating system
OPTION C) To allow communication between hardware and software
OPTION D) To maintain the power of the device
Answer: OPTION C) To allow communication between hardware and software

Which of the following is a Linux command used to change the current directory?

OPTION A) mkdir
OPTION B) cd
OPTION C) ls
OPTION D) rm
Answer: OPTION B) cd

Which of the following is an example of a GUI (Graphical User Interface) operating


system?

OPTION A) MS-DOS
OPTION B) Ubuntu
OPTION C) UNIX
OPTION D) All of the above
Answer: OPTION B) Ubuntu

Which of the following data structures is used to implement recursion?


OPTION A) Queue
OPTION B) Stack
OPTION C) Linked List
OPTION D) Array
Answer: OPTION B) Stack

What is the time complexity of searching for an element in a binary search tree
(BST)?
OPTION A) O(n)
OPTION B) O(log n)
OPTION C) O(n log n)
OPTION D) O(1)
Answer: OPTION B) O(log n)

Which of the following is a sorting algorithm with a worst-case time complexity of


O(n^2)?
OPTION A) Merge Sort
OPTION B) Quick Sort
OPTION C) Bubble Sort
OPTION D) Heap Sort
Answer: OPTION C) Bubble Sort

What is the output of the following code (if the array is sorteOPTION D)?
python
Copy code
arr = [1, 3, 5, 7, 9]
binary_search(arr, 5)
OPTION A) True
OPTION B) 2
OPTION C) 5
OPTION D) None
Answer: OPTION B) 2

Which of the following is a graph traversal technique?


OPTION A) Merge Sort
OPTION B) Binary Search
OPTION C) Depth-First Search (DFS)
OPTION D) Quick Sort
Answer: OPTION C) Depth-First Search (DFS)
In a linked list, which operation takes constant time?
OPTION A) Accessing the nth element
OPTION B) Insertion at the beginning
OPTION C) Searching for an element
OPTION D) Deleting a node from the middle
Answer: OPTION B) Insertion at the beginning

Which of the following algorithms is based on the divide and conquer technique?
OPTION A) Merge Sort
OPTION B) Selection Sort
OPTION C) Bubble Sort
OPTION D) Linear Search
Answer: OPTION A) Merge Sort

In a hash table, what is a common method used to resolve collisions?


OPTION A) Linear probing
OPTION B) Circular queue
OPTION C) Stack overflow
OPTION D) Heapify
Answer: OPTION A) Linear probing

Which of the following data structures can be used to implement a priority queue?
OPTION A) Array
OPTION B) Binary Heap
OPTION C) Stack
OPTION D) Linked List
Answer: OPTION B) Binary Heap

Which of the following is not a type of graph?


OPTION A) Directed graph
OPTION B) Weighted graph
OPTION C) Undirected graph
OPTION D) Binary tree
Answer: OPTION D) Binary tree

Section 8: Software Engineering & Development

What does SDLC stand for?


OPTION A) Software Development Life Cycle
OPTION B) Software Design Life Cycle
OPTION C) System Design Life Cycle
OPTION D) Software Development Logic Control
Answer: OPTION A) Software Development Life Cycle

Which of the following is an example of an agile methodology?


OPTION A) Waterfall
OPTION B) Scrum
OPTION C) V-Model
OPTION D) Spiral
Answer: OPTION B) Scrum

In the context of object-oriented programming (OOP), which of the following is an


example of inheritance?
OPTION A) A class extends another class
OPTION B) A class calls a function
OPTION C) A class implements an interface
OPTION D) A class handles exceptions
Answer: OPTION A) A class extends another class
Which of the following is used to manage the version control of a software project?
OPTION A) Git
OPTION B) SQL
OPTION C) Docker
OPTION D) Jenkins
Answer: OPTION A) Git

Which of the following is true about the Waterfall model?


OPTION A) It is flexible and iterative.
OPTION B) It emphasizes user involvement.
OPTION C) It follows a linear and sequential approach.
OPTION D) It is suitable for projects with frequently changing requirements.
Answer: OPTION C) It follows a linear and sequential approach.

What is the main purpose of unit testing in software development?


OPTION A) To test the entire system
OPTION B) To test individual components for correctness
OPTION C) To test user interfaces
OPTION D) To deploy the application
Answer: OPTION B) To test individual components for correctness

Which of the following is a characteristic of an agile project management process?


OPTION A) Detailed upfront documentation
OPTION B) Fixed requirements and scope
OPTION C) Iterative development with frequent releases
OPTION D) Little client interaction
Answer: OPTION C) Iterative development with frequent releases

Which of the following design patterns is used to restrict the instantiation of a


class to a single object?
OPTION A) Singleton
OPTION B) Factory
OPTION C) Observer
OPTION D) Proxy
Answer: OPTION A) Singleton

Which of the following tools is commonly used for continuous integration in


software development?
OPTION A) Eclipse
OPTION B) Jenkins
OPTION C) GitHub
OPTION D) NetBeans
Answer: OPTION B) Jenkins

Which of the following is an example of a high-level programming language?


OPTION A) Assembly language
OPTION B) C++
OPTION C) Machine code
OPTION D) Binary
Answer: OPTION B) C++

Section 9: Cloud Computing


Which of the following is a characteristic of cloud computing?
OPTION A) On-demand resource availability
OPTION B) Local server management
OPTION C) High upfront costs
OPTION D) Limited scalability
Answer: OPTION A) On-demand resource availability
Which of the following is an example of a Platform as a Service (PaaS) provider?
OPTION A) Amazon EC2
OPTION B) Google App Engine
OPTION C) Microsoft Azure Storage
OPTION D) Dropbox
Answer: OPTION B) Google App Engine

Which of the following is a benefit of cloud computing?


OPTION A) Reduced internet bandwidth usage
OPTION B) Reduced security risks
OPTION C) Increased flexibility and scalability
OPTION D) Increased upfront costs
Answer: OPTION C) Increased flexibility and scalability

Which service model in cloud computing provides infrastructure like servers and
storage?
OPTION A) IaaS
OPTION B) PaaS
OPTION C) SaaS
OPTION D) DaaS
Answer: OPTION A) IaaS

Which of the following is a cloud storage provider?


OPTION A) GitHub
OPTION B) AWS S3
OPTION C) Jenkins
OPTION D) Docker
Answer: OPTION B) AWS S3

What is the name of Amazon's cloud computing platform?


OPTION A) Azure
OPTION B) Google Cloud
OPTION C) AWS (Amazon Web Services)
OPTION D) IBM Cloud
Answer: OPTION C) AWS (Amazon Web Services)

Which of the following cloud models is a combination of private and public clouds?
OPTION A) Hybrid Cloud
OPTION B) Community Cloud
OPTION C) Private Cloud
OPTION D) Public Cloud
Answer: OPTION A) Hybrid Cloud

What is the primary advantage of using cloud-based storage over traditional local
storage?
OPTION A) Increased cost
OPTION B) Limited access
OPTION C) Scalability and remote access
OPTION D) More complex management
Answer: OPTION C) Scalability and remote access

Which cloud service provides software applications over the internet?


OPTION A) IaaS
OPTION B) PaaS
OPTION C) SaaS
OPTION D) DaaS
Answer: OPTION C) SaaS
Which of the following is an example of SaaS (Software as a Service)?
OPTION A) Google Drive
OPTION B) Amazon EC2
OPTION C) Microsoft Azure
OPTION D) Dropbox
Answer: OPTION A) Google Drive

What is the primary goal of DevOps?


OPTION A) To speed up the software development process
OPTION B) To promote collaboration between development and IT operations teams
OPTION C) To improve hardware infrastructure
OPTION D) To reduce the use of cloud computing
Answer: OPTION B) To promote collaboration between development and IT operations
teams

Which tool is commonly used for continuous integration (CI) in a DevOps pipeline?
OPTION A) Jenkins
OPTION B) MySQL
OPTION C) VMware
OPTION D) Docker
Answer: OPTION A) Jenkins

Which of the following tools is used for containerization in DevOps?


OPTION A) Kubernetes
OPTION B) Docker
OPTION C) Terraform
OPTION D) AWS Lambda
Answer: OPTION B) Docker

Which of the following is NOT an advantage of using DevOps?


OPTION A) Faster software delivery
OPTION B) Improved collaboration between teams
OPTION C) Increased hardware costs
OPTION D) Automation of testing and deployment
Answer: OPTION C) Increased hardware costs

What is the purpose of infrastructure as code (IaOPTION C)?


OPTION A) To manage and provision computing infrastructure using code and
automation
OPTION B) To monitor software performance
OPTION C) To deploy applications manually
OPTION D) To encrypt sensitive data
Answer: OPTION A) To manage and provision computing infrastructure using code and
automation

Which of the following is a version control system used in DevOps?


OPTION A) Jenkins
OPTION B) Git
OPTION C) Docker
OPTION D) Terraform
Answer: OPTION B) Git

Which of the following tools is used for orchestration in DevOps?


OPTION A) Kubernetes
OPTION B) GitHub
OPTION C) Jenkins
OPTION D) Nagios
Answer: OPTION A) Kubernetes
Which of the following tools is used for automated configuration management in
DevOps?
OPTION A) Ansible
OPTION B) Docker
OPTION C) Jenkins
OPTION D) Git
Answer: OPTION A) Ansible

What is the main function of a CI/CD pipeline in DevOps?


OPTION A) To automate the process of writing code
OPTION B) To manage system resources
OPTION C) To automate the process of code integration, testing, and deployment
OPTION D) To encrypt data for secure transmission
Answer: OPTION C) To automate the process of code integration, testing, and
deployment

Which of the following is a popular monitoring tool used in DevOps?


OPTION A) Nagios
OPTION B) MongoDB
OPTION C) Redis
OPTION D) MySQL
Answer: OPTION A) Nagios

Section 11: Artificial Intelligence (AI) and Machine Learning (ML)


Which of the following is a type of supervised learning algorithm?
OPTION A) K-means clustering
OPTION B) Linear regression
OPTION C) Decision tree (unsuperviseOPTION D)
OPTION D) Reinforcement learning
Answer: OPTION B) Linear regression

Which of the following is a popular Python library used for machine learning?
OPTION A) Matplotlib
OPTION B) NumPy
OPTION C) Pandas
OPTION D) Scikit-learn
Answer: OPTION D) Scikit-learn

In machine learning, what does "overfitting" mean?


OPTION A) The model is too simple
OPTION B) The model performs well on the training data but poorly on new, unseen
data
OPTION C) The model is underperforming
OPTION D) The model uses too little data
Answer: OPTION B) The model performs well on the training data but poorly on new,
unseen data

Which of the following algorithms is used for classification in machine learning?


OPTION A) K-means clustering
OPTION B) Logistic regression
OPTION C) Principal Component Analysis (PCOPTION A)
OPTION D) K-nearest neighbors (KNN)
Answer: OPTION B) Logistic regression

What is the primary goal of unsupervised learning in machine learning?


OPTION A) To predict outcomes based on labeled data
OPTION B) To explore and identify hidden patterns in data
OPTION C) To optimize the performance of a neural network
OPTION D) To divide data into training and testing sets
Answer: OPTION B) To explore and identify hidden patterns in data

Which type of neural network is most commonly used for image recognition?
OPTION A) Recurrent Neural Network (RNN)
OPTION B) Convolutional Neural Network (CNN)
OPTION C) Support Vector Machine (SVM)
OPTION D) K-means clustering
Answer: OPTION B) Convolutional Neural Network (CNN)

What is the term used to describe the process of improving a machine learning
model’s performance by providing additional data?
OPTION A) Regularization
OPTION B) Cross-validation
OPTION C) Data augmentation
OPTION D) Hyperparameter tuning
Answer: OPTION C) Data augmentation

Which of the following is an example of a reinforcement learning algorithm?


OPTION A) Q-learning
OPTION B) K-means clustering
OPTION C) Linear regression
OPTION D) Naive Bayes classifier
Answer: OPTION A) Q-learning

Which of the following is a common method used to prevent overfitting in machine


learning models?
OPTION A) Increasing model complexity
OPTION B) Decreasing data size
OPTION C) Using more training data
OPTION D) Decreasing the number of features
Answer: OPTION C) Using more training data

Which of the following statements about machine learning models is true?


OPTION A) A model is only as good as the data it is trained on
OPTION B) All models will work equally well with any data
OPTION C) Machine learning models do not require testing
OPTION D) The more complex the model, the better it will perform
Answer: OPTION A) A model is only as good as the data it is trained on

Section 12: Mobile Development


Which of the following is a popular mobile development platform for building native
Android apps?
OPTION A) Swift
OPTION B) React Native
OPTION C) Flutter
OPTION D) Java
Answer: OPTION D) Java

Which framework is commonly used for developing iOS applications?


OPTION A) Xamarin
OPTION B) React Native
OPTION C) Swift
OPTION D) Kotlin
Answer: OPTION C) Swift

Which of the following is a cross-platform mobile development framework?


OPTION A) Java
OPTION B) Kotlin
OPTION C) React Native
OPTION D) Objective-C
Answer: OPTION C) React Native

Which of the following is used to manage mobile application dependencies in


Android?
OPTION A) CocoaPods
OPTION B) Gradle
OPTION C) Maven
OPTION D) npm
Answer: OPTION B) Gradle

In the context of mobile development, what does the term "responsive design" refer
to?
OPTION A) Design that adjusts to different screen sizes and resolutions
OPTION B) A design that is static and does not change
OPTION C) Design that works only on a specific mobile operating system
OPTION D) Design that requires constant updates
Answer: OPTION A) Design that adjusts to different screen sizes and resolutions

Which Android component is responsible for displaying the user interface?


OPTION A) Activity
OPTION B) Service
OPTION C) Content Provider
OPTION D) Broadcast Receiver
Answer: OPTION A) Activity

Which of the following is the primary language used for iOS app development?
OPTION A) JavaScript
OPTION B) Swift
OPTION C) Kotlin
OPTION D) Objective-C
Answer: OPTION B) Swift

Which of the following is the key difference between a native and hybrid mobile
app?
OPTION A) Native apps are written in web languages, hybrid apps are written in
platform-specific languages.
OPTION B) Native apps run on mobile devices, hybrid apps run in web browsers.
OPTION C) Native apps can access device hardware directly, hybrid apps rely on web
technologies.
OPTION D) There is no difference.
Answer: OPTION C) Native apps can access device hardware directly, hybrid apps rely
on web technologies.

Which of the following is a mobile operating system developed by Google?


OPTION A) iOS
OPTION B) Android
OPTION C) Windows Mobile
OPTION D) HarmonyOS
Answer: OPTION B) Android

What is the purpose of an emulator in mobile app development?


OPTION A) To simulate a mobile device's hardware and software
OPTION B) To test apps on real devices only
OPTION C) To compile app code for mobile platforms
OPTION D) To store mobile app data
Answer: OPTION A) To simulate a mobile device's hardware and software

What is the primary goal of software testing?


OPTION A) To find bugs in software
OPTION B) To improve the user interface
OPTION C) To verify the software meets the requirements
OPTION D) To optimize code performance
Answer: OPTION C) To verify the software meets the requirements

Which of the following is a type of software testing performed without knowledge of


the internal workings of the application?
OPTION A) Black-box testing
OPTION B) White-box testing
OPTION C) Regression testing
OPTION D) Unit testing
Answer: OPTION A) Black-box testing

What is the purpose of regression testing?


OPTION A) To verify the functionality of the application after a change or update
OPTION B) To test the application's performance
OPTION C) To test an application's compatibility with different browsers
OPTION D) To ensure the security of the application
Answer: OPTION A) To verify the functionality of the application after a change or
update

Which of the following is a testing technique used to verify if the application


works under heavy load?
OPTION A) Smoke testing
OPTION B) Load testing
OPTION C) User acceptance testing
OPTION D) Sanity testing
Answer: OPTION B) Load testing

What is the purpose of unit testing in software development?


OPTION A) To test the complete application
OPTION B) To test individual units or components of the application
OPTION C) To test the security of the application
OPTION D) To test the deployment process
Answer: OPTION B) To test individual units or components of the application

Which of the following tools is used for automated testing?


OPTION A) Selenium
OPTION B) Git
OPTION C) Docker
OPTION D) Jenkins
Answer: OPTION A) Selenium

Which of the following best describes the term "test case"?


OPTION A) A specific condition to test a specific functionality
OPTION B) A report documenting software errors
OPTION C) A program that automates the testing process
OPTION D) A tool used to monitor software performance
Answer: OPTION A) A specific condition to test a specific functionality

What is the difference between verification and validation in software testing?


OPTION A) Verification ensures the software is built according to requirements;
validation ensures the software meets the needs of the user.
OPTION B) Verification tests the application’s functionality; validation tests its
performance.
OPTION C) Verification is done by developers, while validation is done by users.
OPTION D) Verification and validation are the same.
Answer: OPTION A) Verification ensures the software is built according to
requirements; validation ensures the software meets the needs of the user.

Which testing type focuses on the usability of the software for end users?
OPTION A) Regression testing
OPTION B) User acceptance testing (UAT)
OPTION C) Unit testing
OPTION D) Functional testing
Answer: OPTION B) User acceptance testing (UAT)

Which of the following is the first phase in the software testing life cycle?
OPTION A) Test Execution
OPTION B) Test Planning
OPTION C) Test Design
OPTION D) Test Closure
Answer: OPTION B) Test Planning

Section 14: Databases and SQL

Which of the following SQL statements is used to retrieve data from a database?
OPTION A) INSERT
OPTION B) SELECT
OPTION C) UPDATE
OPTION D) DELETE
Answer: OPTION B) SELECT

Which of the following is a type of JOIN in SQL?


OPTION A) Inner Join
OPTION B) Outer Join
OPTION C) Left Join
OPTION D) All of the above
Answer: OPTION D) All of the above

What is a foreign key in a relational database?


OPTION A) A key used to identify a unique row in a table
OPTION B) A key that links two tables together
OPTION C) A key used to enforce data integrity
OPTION D) A key used to sort data in a table
Answer: OPTION B) A key that links two tables together

Which of the following is NOT a type of constraint in SQL?


OPTION A) PRIMARY KEY
OPTION B) UNIQUE
OPTION C) FOREIGN KEY
OPTION D) DISTINCT
Answer: OPTION D) DISTINCT

What is the purpose of the GROUP BY clause in SQL?


OPTION A) To sort the result set in ascending or descending order
OPTION B) To combine rows with the same values into summary rows
OPTION C) To filter the result set based on a condition
OPTION D) To join multiple tables
Answer: OPTION B) To combine rows with the same values into summary rows

Which of the following is used to ensure data integrity in a relational database?


OPTION A) Indexing
OPTION B) Normalization
OPTION C) Encryption
OPTION D) Data warehousing
Answer: OPTION B) Normalization
Which of the following SQL commands is used to remove all records from a table
without deleting the table itself?
OPTION A) DELETE
OPTION B) REMOVE
OPTION C) DROP
OPTION D) TRUNCATE
Answer: OPTION D) TRUNCATE

Which of the following is the correct SQL syntax to update a record in a table?
OPTION A) UPDATE table_name SET column1 = value1 WHERE condition;
OPTION B) MODIFY table_name SET column1 = value1;
OPTION C) CHANGE table_name SET column1 = value1;
OPTION D) UPDATE column1 = value1 FROM table_name;
Answer: OPTION A) UPDATE table_name SET column1 = value1 WHERE condition;

Which of the following SQL clauses is used to filter records based on a condition?
OPTION A) ORDER BY
OPTION B) WHERE
OPTION C) GROUP BY
OPTION D) HAVING
Answer: OPTION B) WHERE

In SQL, what does the DISTINCT keyword do?


OPTION A) Retrieves all records, including duplicates
OPTION B) Retrieves only unique records
OPTION C) Retrieves records in a specified order
OPTION D) Retrieves records from multiple tables
Answer: OPTION B) Retrieves only unique records

Section 15: Big Data and NoSQL Databases

Which of the following is a popular NoSQL database?


OPTION A) MySQL
OPTION B) PostgreSQL
OPTION C) MongoDB
OPTION D) Oracle
Answer: OPTION C) MongoDB

Which of the following is the main feature of a NoSQL database?


OPTION A) Structured data storage using tables
OPTION B) High scalability and flexibility in data models
OPTION C) Relational data management
OPTION D) Use of SQL for querying data
Answer: OPTION B) High scalability and flexibility in data models

Which of the following is a data model used by NoSQL databases?


OPTION A) Document model
OPTION B) Graph model
OPTION C) Key-value model
OPTION D) All of the above
Answer: OPTION D) All of the above

Which of the following technologies is associated with Big Data analytics?


OPTION A) Hadoop
OPTION B) MySQL
OPTION C) MongoDB
OPTION D) Redis
Answer: OPTION A) Hadoop
In a NoSQL key-value store, what is stored as the value?
OPTION A) A table of records
OPTION B) A document or object
OPTION C) A unique identifier
OPTION D) An array of values
Answer: OPTION B) A document or object

Which of the following describes the term “MapReduce” in the context of Big Data?
OPTION A) A data storage format
OPTION B) A technique for indexing large datasets
OPTION C) A programming model for processing large data sets in parallel
OPTION D) A type of database
Answer: OPTION C) A programming model for processing large data sets in parallel

Which of the following is a primary advantage of using NoSQL databases for Big
Data?
OPTION A) Relational schema support
OPTION B) Scalability and flexibility for handling unstructured data
OPTION C) Data consistency across distributed systems
OPTION D) Lack of complex queries
Answer: OPTION B) Scalability and flexibility for handling unstructured data

Which of the following is the main function of Apache Hadoop?


OPTION A) To query large datasets
OPTION B) To store large datasets across a distributed system
OPTION C) To index and organize relational data
OPTION D) To perform machine learning on large datasets
Answer: OPTION B) To store large datasets across a distributed system

What is the purpose of a column-family store in NoSQL?


OPTION A) To store key-value pairs with additional metadata
OPTION B) To organize data into tables and rows like traditional relational
databases
OPTION C) To allow efficient querying of specific columns across large datasets
OPTION D) To store unstructured data in a flexible schema
Answer: OPTION C) To allow efficient querying of specific columns across large
datasets

Which of the following is an example of a NoSQL document database?


OPTION A) Cassandra
OPTION B) HBase
OPTION C) CouchDB
OPTION D) Redis
Answer: OPTION C) CouchDB

Which of the following is a characteristic of cloud computing?


OPTION A) Requires physical infrastructure management by the user
OPTION B) Provides on-demand access to shared computing resources
OPTION C) Limited scalability
OPTION D) Is only used for storing large files
Answer: OPTION B) Provides on-demand access to shared computing resources

Which of the following is an example of a cloud service model?


OPTION A) SaaS
OPTION B) PaaS
OPTION C) IaaS
OPTION D) All of the above
Answer: OPTION D) All of the above
Which of the following cloud computing models provides the highest level of control
to the user?
OPTION A) Software as a Service (SaaS)
OPTION B) Platform as a Service (PaaS)
OPTION C) Infrastructure as a Service (IaaS)
OPTION D) Private cloud
Answer: OPTION C) Infrastructure as a Service (IaaS)

What is the main advantage of using cloud computing for businesses?


OPTION A) Reduced need for skilled IT staff
OPTION B) Increased security risks
OPTION C) Scalability and flexibility
OPTION D) Fixed costs and lack of flexibility
Answer: OPTION C) Scalability and flexibility

Which of the following cloud providers is most known for offering IaaS and PaaS
services?
OPTION A) Google Cloud Platform
OPTION B) Amazon Web Services (AWS)
OPTION C) Microsoft Azure
OPTION D) All of the above
Answer: OPTION D) All of the above

What is the purpose of a Virtual Machine (VM) in cloud computing?


OPTION A) To provide a scalable storage solution
OPTION B) To host a web application
OPTION C) To emulate hardware in a virtualized environment
OPTION D) To store large databases
Answer: OPTION C) To emulate hardware in a virtualized environment

Which of the following is a benefit of using a hybrid cloud model?


OPTION A) It allows data to be stored solely on public cloud servers.
OPTION B) It provides a balance of on-premises infrastructure and cloud resources.
OPTION C) It is cheaper than using any public cloud alone.
OPTION D) It removes the need for security controls.

Answer: OPTION B) It provides a balance of on-premises infrastructure and cloud


resources.
Which of the following is a cloud computing service that delivers software
applications over the internet?
OPTION A) SaaS (Software as a Service)
OPTION B) IaaS (Infrastructure as a Service)
OPTION C) PaaS (Platform as a Service)
OPTION D) DaaS (Data as a Service)
Answer: OPTION A) SaaS (Software as a Service)

What does the term “elasticity” refer to in cloud computing?


OPTION A) The ability to scale computing resources up or down automatically based
on demand
OPTION B) The ability to use cloud resources for free
OPTION C) The process of managing user access and permissions
OPTION D) The security of cloud servers against cyber-attacks
Answer: OPTION A) The ability to scale computing resources up or down automatically
based on demand

What is the primary difference between public and private cloud models?
OPTION A) Public clouds are more secure than private clouds.
OPTION B) Public clouds are owned and operated by third-party providers, while
private clouds are owned by the organization.
OPTION C) Private clouds offer more scalability than public clouds.
OPTION D) There is no difference between public and private clouds.
Answer: OPTION B) Public clouds are owned and operated by third-party providers,
while private clouds are owned by the organization.

Section 17: Cybersecurity

Which of the following is the process of protecting a computer network from


unauthorized access or attacks?
OPTION A) Network monitoring
OPTION B) Network segmentation
OPTION C) Network security
OPTION D) Data encryption
Answer: OPTION C) Network security

Which of the following is a type of malware that disguises itself as a legitimate


software or file?
OPTION A) Virus
OPTION B) Trojan Horse
OPTION C) Worm
OPTION D) Spyware
Answer: OPTION B) Trojan Horse

Which of the following is an example of a strong password?


OPTION A) Password123
OPTION B) 123456
OPTION C) P@ssw0rd2024
OPTION D) admin
Answer: OPTION C) P@ssw0rd2024

Which of the following is used to detect and respond to network intrusions?


OPTION A) Antivirus software
OPTION B) Intrusion Detection System (IDS)
OPTION C) Firewall
OPTION D) VPN
Answer: OPTION B) Intrusion Detection System (IDS)

Which type of attack is aimed at overwhelming a system or network by flooding it


with excessive traffic?
OPTION A) Phishing
OPTION B) Denial of Service (DoS)
OPTION C) Man-in-the-middle
OPTION D) SQL injection
Answer: OPTION B) Denial of Service (DoS)

Which of the following is an example of a phishing attack?


OPTION A) Sending fake emails that look like legitimate ones to steal sensitive
information
OPTION B) Exploiting software vulnerabilities to gain access
OPTION C) Intercepting communication between two parties to steal data
OPTION D) Injecting malicious code into a web form
Answer: OPTION A) Sending fake emails that look like legitimate ones to steal
sensitive information

What does the term “two-factor authentication” (2FOPTION A) mean?


OPTION A) Using two passwords for extra security
OPTION B) Logging into an account from two different devices
OPTION C) Requiring two forms of identification to access an account
OPTION D) Using one password and a physical token
Answer: OPTION C) Requiring two forms of identification to access an account

Which of the following is a common method of encrypting sensitive data during


transmission?
OPTION A) SSL/TLS encryption
OPTION B) Firewalls
OPTION C) Hashing
OPTION D) Authentication tokens
Answer: OPTION A) SSL/TLS encryption

What is the purpose of a firewall in cybersecurity?


OPTION A) To monitor network traffic
OPTION B) To prevent unauthorized access to or from a private network
OPTION C) To detect and remove malware from a system
OPTION D) To encrypt sensitive data
Answer: OPTION B) To prevent unauthorized access to or from a private network

Which of the following best describes the concept of “social engineering” in


cybersecurity?
OPTION A) Using advanced algorithms to break encryption
OPTION B) Manipulating individuals into revealing confidential information
OPTION C) Using artificial intelligence to predict cyber threats
OPTION D) Preventing unauthorized access by encrypting data
Answer: OPTION B) Manipulating individuals into revealing confidential information

Section 18: Networking and Protocols


Which protocol is commonly used to secure communications over the internet?
OPTION A) FTP
OPTION B) HTTP
OPTION C) HTTPS
OPTION D) SMTP
Answer: OPTION C) HTTPS

What is the primary purpose of the Domain Name System (DNS)?


OPTION A) To provide IP addresses to devices on a network
OPTION B) To map domain names to IP addresses
OPTION C) To secure network communications
OPTION D) To manage network traffic
Answer: OPTION B) To map domain names to IP addresses

What does the acronym IP stand for in networking?


OPTION A) Internet Protocol
OPTION B) Internal Process
OPTION C) Internet Program
OPTION D) Internet Pathway
Answer: OPTION A) Internet Protocol

Which of the following is the purpose of the ARP protocol in networking?


OPTION A) To resolve IP addresses to MAC addresses
OPTION B) To encrypt data during transmission
OPTION C) To control traffic between networks
OPTION D) To prevent unauthorized network access
Answer: OPTION A) To resolve IP addresses to MAC addresses

Which of the following layers of the OSI model is responsible for end-to-end
communication?
OPTION A) Application Layer
OPTION B) Transport Layer
OPTION C) Network Layer
OPTION D) Data Link Layer
Answer: OPTION B) Transport Layer

Which protocol is used for sending emails between servers?


OPTION A) HTTP
OPTION B) FTP
OPTION C) SMTP
OPTION D) POP3
Answer: OPTION C) SMTP

What is the main function of a router in a network?


OPTION A) To route email messages
OPTION B) To connect devices within a local network
OPTION C) To forward data packets between networks
OPTION D) To secure the network from attacks
Answer: OPTION C) To forward data packets between networks

Which of the following is used to assign IP addresses dynamically to devices in a


network?
OPTION A) DHCP (Dynamic Host Configuration Protocol)
OPTION B) DNS (Domain Name System)
OPTION C) NAT (Network Address Translation)
OPTION D) FTP (File Transfer Protocol)
Answer: OPTION A) DHCP (Dynamic Host Configuration Protocol)

Which of the following is a private IP address range?


OPTION A) 172.16.0.0 to 172.31.255.255
OPTION B) 192.168.0.0 to 192.168.255.255
OPTION C) 10.0.0.0 to 10.255.255.255
OPTION D) All of the above
Answer: OPTION D) All of the above

Which of the following is used to prevent a network from being flooded with
traffic?
OPTION A) Load balancing
OPTION B) Rate limiting
OPTION C) NAT
OPTION D) DNS filtering
Answer: OPTION B) Rate limiting

You might also like